[alpha.informatica.com] Expensive DOMXSS
Medium
I
Informatica
Submitted None
Actions:
Reported by
albinowax
Vulnerability Details
Technical details and impact analysis
Hi again,
The page at https://alpha.informatica.com/assessmentBase/assessment.html contains the following blocked:
<script>
var baseHeaderElement = '<base href="'+ window.location.pathname + '" />';
$('head').append(baseHeaderElement);
</script>
An attacker can exploit this using a protocol-relative URL. In Chrome, open the following URL and either proxy though Burp or look at the network tab in the dev console: https://alpha.informatica.com//assessmentBase/assessment.html
You will see a failed GET request to https://assessmentbase/etc/designs/informatica-com/assessmentform/js/angular.min.js
A sufficiently rich attacker can register assessementbase, and make it serve malicious JavaScript, turning this into a reflected XSS vulnerability.
This issue was passively identified by burp suite's code analysis engine.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Cross-site Scripting (XSS) - Generic